{"title":"Determinants of Geographic Information Technologies Intention and Adoption and Mozambique Institutions’ Perspectives","authors":"Nelson Amade, M. Painho, Tiago Oliveira","doi":"10.3923/RJIT.2017.64.73","DOIUrl":"https://doi.org/10.3923/RJIT.2017.64.73","url":null,"abstract":"Amade, N., Painho, M., & Oliveira, T. (2017). Determinants of Geographic Information Technologies Intention and Adoption and Mozambique Institutions’ Perspectives. Research Journal of Information Technology, 2(9), 64-73. DOI: 10.3923/rjit.2017.64.73","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Praveenkum, K. Thenmozhi, John Bosco Bala, R. Amirtharaj
{"title":"Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey","authors":"P. Praveenkum, K. Thenmozhi, John Bosco Bala, R. Amirtharaj","doi":"10.3923/RJIT.2017.46.63","DOIUrl":"https://doi.org/10.3923/RJIT.2017.46.63","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Anushiadev, P. Praveenkum, John Bosco Bala, R. Amirtharaj
{"title":"Revolving of Pixels and Bits in Pixels-Plan (E) Tary Encryption","authors":"R. Anushiadev, P. Praveenkum, John Bosco Bala, R. Amirtharaj","doi":"10.3923/RJIT.2017.25.31","DOIUrl":"https://doi.org/10.3923/RJIT.2017.25.31","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133903276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Kumari, Bharath Kompelli, Reshma Kalicheti, Naga Saride, K. Elleithy, L. Almazaydeh
{"title":"Efficient Implementation of Pseudo Random Numbers","authors":"E. Kumari, Bharath Kompelli, Reshma Kalicheti, Naga Saride, K. Elleithy, L. Almazaydeh","doi":"10.3923/RJIT.2017.32.37","DOIUrl":"https://doi.org/10.3923/RJIT.2017.32.37","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129919664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Photographic Experts Group Image Compression using Revised Run Length Encoding","authors":"F. Alsaade, Mahaboob Shaik","doi":"10.3923/RJIT.2017.38.45","DOIUrl":"https://doi.org/10.3923/RJIT.2017.38.45","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model of Textual Data Linking and Clustering in Relational Databases","authors":"Wael M.S. Yafoo","doi":"10.3923/RJIT.2017.7.17","DOIUrl":"https://doi.org/10.3923/RJIT.2017.7.17","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115439593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Intrusion Detection Algorithms for Secure E-business Using Artificial Intelligence","authors":"Hiren K. Mewada, Sanjay Patel","doi":"10.3923/RJIT.2017.1.6","DOIUrl":"https://doi.org/10.3923/RJIT.2017.1.6","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Calling of Garbage Collector to Decrease Memory Leaks Based on Methods Ranking","authors":"M. S. Farag, O. M. Hassan","doi":"10.3923/RJIT.2017.18.24","DOIUrl":"https://doi.org/10.3923/RJIT.2017.18.24","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"80 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123143624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Value of Release Management in the Journey of Information Technology Delivery Aligning to Business Requirements","authors":"C. Prasad, A.Chandramohan, John Hatter","doi":"10.19026/rjit.7.3054","DOIUrl":"https://doi.org/10.19026/rjit.7.3054","url":null,"abstract":"Over the years, Information technology has become the backbone of businesses to the point, where it would be impossible for many to function (let alone succeed) without it. As a result of its increasing role in the enterprise, the Information Technology function is changing, morphing from a technology provider into a Strategic partner. In every organization, the application and portfolios are becoming increasingly interconnected and dependent on one other, when one is changed-the risk is high for a detrimental impact to the end user services provided by another application. And also, within the Information technology the development and operation teams that deliver and support the mixture of heterogeneous technology applications are distributed, increasingly outsourced to technology partners and the complexity is growing. The aim of the research is to address the raising challenges between business requirement and Information technology i.e., development and operations-the need for release management is crucial. Release Management acts as a bridge between development and operation teams and responsible for driving the release train from planning to deployment ensuring high quality on-schedule releases meeting the business demand. This study explains in detail about the effectively setting up the enterprise release management function and a survey about the importance of release function by interviewing the Information Technology experts around the globe and it is understood that Release management acts as a coordinator to improve the collaboration between disparate team through the strong policies, process and governance. This study also describes the benefits realized through the implementation of a formal release management discipline in major Canada based agriculture financial institution, which improved the quality of its IT release delivery.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tasks Scheduling in Cloud Computing Environment using Workflowsim","authors":"P. Rawat, Priti Dimri, G. P. Saroha","doi":"10.3923/RJIT.2016.98.104","DOIUrl":"https://doi.org/10.3923/RJIT.2016.98.104","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}